Random Articles

Have a deep view into what people are curious about.

🔗 One electron universe

🔗 Physics

The one-electron universe postulate, proposed by John Wheeler in a telephone call to Richard Feynman in the spring of 1940, is the hypothesis that all electrons and positrons are actually manifestations of a single entity moving backwards and forwards in time. According to Feynman:

Discussed on

🔗 Trillion-dollar coin

🔗 United States/U.S. Government 🔗 United States 🔗 Finance & Investment 🔗 Politics 🔗 United States/District of Columbia

The trillion-dollar coin is a concept that emerged during the United States debt-ceiling crisis in 2011, as a proposed way to bypass any necessity for the United States Congress to raise the country's borrowing limit, through the minting of very high-value platinum coins. The concept gained more mainstream attention by late 2012 during the debates over the United States fiscal cliff negotiations and renewed debt-ceiling discussions. After reaching the headlines during the week of January 7, 2013, use of the trillion dollar coin concept was ultimately rejected by the Federal Reserve and the Treasury..

The concept of the trillion-dollar coin was reintroduced in March 2020 in the form of a congressional proposal during the 2020 stock market crash.

Discussed on

🔗 Dublin Whiskey Fire

🔗 Food and drink 🔗 Ireland

The Dublin whiskey fire took place on 18 June 1875 in the Liberties area of Dublin. It lasted a single night but killed 13 people, and resulted in €6 million worth of damage in whiskey alone (adjusted for inflation). People drank the 6 inches (150 mm) deep river of whiskey that is said to have flowed as far as the Coombe. None of the fatalities suffered during the fire were due to smoke inhalation, burns, or any other form of direct contact with the fire itself; all of them were attributed to alcohol poisoning.

Discussed on

🔗 Valonia ventricosa

🔗 Algae

Valonia ventricosa, also known as bubble algae or sailor's eyeballs is a species of alga found in oceans throughout the world in tropical and subtropical regions. It is one of the largest – if not the largest – unicellular organisms.

Discussed on

🔗 Mass Surveillance in the United States

🔗 United States/U.S. Government 🔗 United States 🔗 Human rights 🔗 Mass surveillance 🔗 Military history 🔗 Military history/North American military history 🔗 Military history/United States military history 🔗 Freedom of speech 🔗 Military history/Intelligence 🔗 Law Enforcement

The practice of mass surveillance in the United States dates back to World War I wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First World War and the Second World War, the surveillance continued, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists then deemed subversive. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

The formation of the international UKUSA surveillance agreement of 1946 evolved into the ECHELON collaboration by 1955 of five English-speaking nations, also known as the Five Eyes, and focused on interception of electronic communications, with substantial increases in domestic surveillance capabilities.

Following the September 11th attacks of 2001, domestic and international mass surveillance capabilities grew immensely. Contemporary mass surveillance relies upon annual presidential executive orders declaring a continued State of National Emergency, first signed by George W. Bush on September 14, 2001 and then continued on an annual basis by President Barack Obama, and upon several subsequent national security Acts including the USA PATRIOT Act and FISA Amendment Act's PRISM surveillance program. Critics and political dissenters currently describe the effects of these acts, orders, and resulting database network of Fusion centers as forming a veritable American police state that simply institutionalized the illegal COINTELPRO tactics used to assassinate dissenters and leaders from the 1950s onwards.

Additional surveillance agencies, such as the DHS and the position of Director of National Intelligence have exponentially escalated mass surveillance since 2001. A series of media reports in 2013 revealed more recent programs and techniques employed by the US intelligence community. Advances in computer and information technology allow the creation of huge national databases that facilitate mass surveillance in the United States by DHS managed Fusion centers, the CIA's Terrorist Threat Integration Center (TTIC) program, and the FBI's TSDB.

Mass surveillance databases are also cited as responsible for profiling Latino Americans and contributing to "self-deportation" techniques, or physical deportations by way of the DHS's ICEGang national database.

After World War I, the US Army and State Department established the Black Chamber, also known as the Cipher Bureau, which began operations in 1919. The Black Chamber was headed by Herbert O. Yardley, who had been a leader in the Army's Military Intelligence program. Regarded as a precursor to the National Security Agency, it conducted peacetime decryption of material including diplomatic communications until 1929.

In the advent of World War II, the Office of Censorship was established. The wartime agency monitored "communications by mail, cable, radio, or other means of transmission passing between the United States and any foreign country". This included the 350,000 overseas cables and telegrams and 25,000 international telephone calls made each week. "Every letter that crossed international or U.S. territorial borders from December 1941 to August 1945 was subject to being opened and scoured for details."

With the end of World War II, Project SHAMROCK was established in 1945. The organization was created to accumulate telegraphic data entering and exiting from the United States. Major communication companies such as Western Union, RCA Global and ITT World Communications actively aided the project, allowing American intelligence officials to gain access to international message traffic. Under the project, and many subsequent programs, no precedent had been established for judicial authorisation, and no warrants were issued for surveillance activities. The project was terminated in 1975.

In 1952, President Harry S. Truman established the National Security Agency (NSA) in 1952 for the purposes of collecting, processing, and monitoring intelligence data. The existence of NSA was not known to people as the memorandum by President Truman was classified.

When the Citizens' Commission to Investigate the FBI published stolen FBI documents revealing abuse of intelligence programs in 1971, Senator Frank Church began an investigation into the programs that become known as the Church Committee. The committee sought to investigate intelligence abuses throughout the 1970s. Following a report provided by the committee outlining egregious abuse, in 1976 Congress established the Senate Select Committee on Intelligence. It would later be joined by the Foreign Intelligence Surveillance Court in 1978. The institutions worked to limit the power of the agencies, ensuring that surveillance activities remained within the rule of law.

Following the attacks of September 11, 2001, Congress passed The Patriot Act to strengthen security and intelligence efforts. The act granted the President broad powers on the war against terror, including the power to bypass the FISA Court for surveillance orders in cases of national security. Additionally, mass surveillance activities were conducted alongside various other surveillance programs under the head of President's Surveillance Program. Under pressure from the public, the warrantless wiretapping program was allegedly ended in January 2007.

Many details about the surveillance activities conducted in the United States were revealed in the disclosure by Edward Snowden in June 2013. Regarded as one of the biggest media leaks in the United States, it presented extensive details about the surveillance programs of the NSA, that involved interception of internet data and telephonic calls from over a billion users, across various countries.

Discussed on

🔗 Avoidance Speech

🔗 Australia 🔗 Languages 🔗 Australia/Indigenous peoples of Australia

Avoidance speech is a group of sociolinguistic phenomena in which a special restricted speech style must be used in the presence of or in reference to certain relatives. Avoidance speech is found in many Australian Aboriginal languages and Austronesian languages as well as some North American languages, Highland East Cushitic languages and Southern Bantu languages. Chinese naming taboo prohibits speaking and writing syllables or characters that appear in the names of esteemed people, such as emperors, parents, and ancestors.

Avoidance speech styles tend to have the same phonology and grammar as the standard language they are a part of. The lexicon, however, tends to be smaller than in normal speech since the styles are only used for limited communication.

Discussed on

🔗 Paradox of Plenty

🔗 Climate change 🔗 Economics 🔗 Politics 🔗 Energy 🔗 International development 🔗 Mining

The resource curse, also known as the paradox of plenty or the poverty paradox, is the phenomenon of countries with an abundance of natural resources (such as fossil fuels and certain minerals) having less economic growth, less democracy, or worse development outcomes than countries with fewer natural resources. There are many theories and much academic debate about the reasons for and exceptions to the adverse outcomes. Most experts believe the resource curse is not universal or inevitable but affects certain types of countries or regions under certain conditions.

Discussed on

🔗 Wends of Texas

🔗 United States 🔗 Germany 🔗 Ethnic groups 🔗 United States/Texas

The Texas Wends or Wends of Texas are a group of people descended from a congregation of 558 Sorbian/Wendish people under the leadership and pastoral care of John Kilian (Sorbian languages: Jan Kilian, German: Johann Killian) who emigrated from Lusatia (part of modern-day Germany) to Texas in 1854. The term also refers to the other emigrations (and all descendants) occurring before and after this group. However, none came close to the size or importance of the Wendish culture in Texas.

Discussed on

🔗 Mamihlapinatapai, Most Succinct Word

🔗 Linguistics 🔗 Linguistics/Applied Linguistics 🔗 Languages

The word mamihlapinatapai is derived from the Yaghan language of Tierra del Fuego, listed in The Guinness Book of World Records as the "most succinct word", and is considered one of the hardest words to translate. It has been translated as "a look that without words is shared by two people who want to initiate something, but that neither will start" or "looking at each other hoping that the other will offer to do something which both parties desire but are unwilling to do".

A romantic interpretation of the meaning has also been given, as "that look across the table when two people are sharing an unspoken but private moment. When each knows the other understands and is in agreement with what is being expressed. An expressive and meaningful silence."

Discussed on

🔗 Wingless Electromagnetic Air Vehicle

🔗 Aviation 🔗 Aviation/aircraft 🔗 Florida

The Wingless Electromagnetic Air Vehicle (WEAV) is a heavier than air flight system developed at the University of Florida, funded by the Air Force Office of Scientific Research. The WEAV was invented in 2006 by Dr. Subrata Roy, plasma physicist, aerospace engineering professor at the University of Florida, and has been a subject of several patents. The WEAV employs no moving parts, and combines the aircraft structure, propulsion, energy production and storage, and control subsystems into one integrated system.

Discussed on